• Title/Summary/Keyword: requests

Search Result 1,535, Processing Time 0.022 seconds

A Study on Trends and Perceptions of Spatial Changes in University Libraries (대학도서관 공간변화 동향 및 인식에 관한 연구)

  • Chung, Jae-Young;Kim, Hee-Jeon
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.3
    • /
    • pp.31-54
    • /
    • 2022
  • This study is to suggest the direction of the spatial change of the university library based on the trend of the spatial change in the university libraries and a survey on the perception of the librarians. For this purpose, the characteristics of the spatial change of the university libraries from 2000 to 2020 were analyzed, and the problems of the spatial change of the university libraries were identified through a survey. As a result of the survey, there was a total of 99 spatial changes in the university libraries nationwide over the past 20 years, including new construction, extension and remodeling. In recent years, it was found that due to the university's budget tightening policy, the university libraries focus on remodeling rather than new construction or extension. The characteristics of the spatial change were analyzed as follows. First, the resting areas have been expanded in the libraries. Second, The libraries are in pursuit of pleasant and comfortable atmosphere. Third, the libraries aim to establish an innovative and creative space. All these changes have been made in order to accommodate the requests of users and increase the number of users. It was also found that spatial change has advantages in these two points: providing various spaces and increasing the number of library visitors. On the other hand, spatial change has the problems such as the increased cost of maintaining the facility and the lack of management manpower. Additionally, a few more problems of spatial change are pointed out: first, spatial change only reflects the trend of the times without making a big change in the services and the actual value of the university library. Second, it has made university libraries standardized losing each library's own characteristics. This study suggests that the spatial change of the university library should secure the distinctiveness of the university library, accommodate various changes, and aim for the symbolism that can prove the value and existence of the university library.

Analysis of Twitter Post with 'Self-Iinjury' and 'Ssuicide' Using Text Mining (텍스트 마이닝기법을 활용한 '자해' 및 '자살' 관련 트위터 게시물 분석)

  • Yuri Lee;Hoin Kwon
    • Korean Journal of Culture and Social Issue
    • /
    • v.29 no.1
    • /
    • pp.147-170
    • /
    • 2023
  • This study explored keywords and key topics by collecting posts related to 'self-Iinjury' and 'suicide' through Twitter. The study subjects were selected as posts containing related hashtags related to self-injury and suicide from October 29, 2019 to November 30, 2020. Text mining based on collected posts resulted in a total of 11 key topics: -6 related to 'self-Iinjury' and 5 related to 'suicide'. The main message in the topic is as follows. First, looking at the main messages contained in the topic, they honestly expressed self-harm and suicide experiences that are difficult to express offline online, and used SNS as a channelpath for requesting help requests. Second, there were common and discriminatory characteristics in posts related to 'self-Iinjury' and 'suicide'. Although topics related to 'self-Iinjury' mainly revealed emotional control and interpersonal functions of self-harm, messages related to 'suicide' showed more clearly messages about suicide prevention addressing and social problems. These results are meaningful in that they can understand the opinions of people who have experienced self-harm and suicide accidents and the public voice on self-harm and suicide-related issues could be better understood, and that this study seeks for effective self-harm and suicide prevention and intervention measures for self-harm and suicide issues.

Tracking of cryptocurrency moved through blockchain Bridge (블록체인 브릿지를 통해 이동한 가상자산의 추적 및 검증)

  • Donghyun Ha;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.32-44
    • /
    • 2023
  • A blockchain bridge (hereinafter referred to as "bridge") is a service that enables the transfer of assets between blockchains. A bridge accepts virtual assets from users and delivers the same virtual assets to users on other blockchains. Users use bridges because they cannot transfer assets to other blockchains in the usual way because each blockchain environment is independent. Therefore, the movement of assets through bridges is not traceable in the usual way. If a malicious actor moves funds through a bridge, existing asset tracking tools are limited in their ability to trace it. Therefore, this paper proposes a method to obtain information on bridge usage by identifying the structure of the bridge and analyzing the event logs of bridge requests. First, to understand the structure of bridges, we analyzed bridges operating on Ethereum Virtual Machine(EVM) based blockchains. Based on the analysis, we applied the method to arbitrary bridge events. Furthermore, we created an automated tool that continuously collects and stores bridge usage information so that it can be used for actual tracking. We also validated the automated tool and tracking method based on an asset transfer scenario. By extracting the usage information through the tool after using the bridge, we were able to check important information for tracking, such as the sending blockchain, the receiving blockchain, the receiving wallet address, and the type and quantity of tokens transferred. This showed that it is possible to overcome the limitations of tracking asset movements using blockchain bridges.

  • PDF

A study of Modeling and Simulation for Analyzing DDoS Attack Damage Scale and Defence Mechanism Expense (DDoS 공격 피해 규모 및 대응기법 비용분석을 위한 모델링 및 시뮬레이션 기술연구)

  • Kim, Ji-Yeon;Lee, Ju-Li;Park, Eun-Ji;Jang, Eun-Young;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.39-47
    • /
    • 2009
  • Recently, the threat of DDoS attacks is increasing and many companies are planned to deploy the DDoS defense solutions in their networks. The DDoS attack usually transmits heavy traffic data to networks or servers and they cannot handle the normal service requests because of running out of resources. Since it is very hard to prevent the DDoS attack beforehand, the strategic plan is very important. In this work, we have conducted modeling and simulation of the DDoS attack by changing the number of servers and estimated the duration that services are available. In this work, the modeling and simulation is conducted using OPNET Modeler. The simulation result can be used as a parameter of trade-off analysis of DDoS defense cost and the service's value. In addition, we have presented a way of estimating the cost effectiveness in deployment of the DDoS defense system.

Cluster-based Delay-adaptive Sensor Scheduling for Energy-saving in Wireless Sensor Networks (센서네트워크에서 클러스터기반의 에너지 효율형 센서 스케쥴링 연구)

  • Choi, Wook;Lee, Yong;Chung, Yoo-Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.47-59
    • /
    • 2009
  • Due to the application-specific nature of wireless sensor networks, the sensitivity to such a requirement as data reporting latency may vary depending on the type of applications, thus requiring application-specific algorithm and protocol design paradigms which help us to maximize energy conservation and thus the network lifetime. In this paper, we propose a novel delay-adaptive sensor scheduling scheme for energy-saving data gathering which is based on a two phase clustering (TPC). The ultimate goal is to extend the network lifetime by providing sensors with high adaptability to the application-dependent and time-varying delay requirements. The TPC requests sensors to construct two types of links: direct and relay links. The direct links are used for control and forwarding time critical sensed data. On the other hand, the relay links are used only for data forwarding based on the user delay constraints, thus allowing the sensors to opportunistically use the most energy-saving links and forming a multi-hop path. Simulation results demonstrate that cluster-based delay-adaptive data gathering strategy (CD-DGS) saves a significant amount of energy for dense sensor networks by adapting to the user delay constraints.

Evaluation of Radiographic Positioning Techniques Used in Local Hospitals after Teleradiology Consultation

  • Sojin Kim;Miju Oh;Yooyoung Lee;Minju Lee;Jiyoung Ban;Uhjin Kim;Jiwoon Park;Jaepung Han;Dongwoo Chang
    • Journal of Veterinary Clinics
    • /
    • v.39 no.6
    • /
    • pp.326-333
    • /
    • 2022
  • The purpose of this study was to evaluate the radiographic positioning techniques used in local animal hospitals, identify the most common positioning problem, and determine whether there were changes after teleradiology consultations. From September 2016 to April 2021, 15 local animal hospitals that requested radiographic interpretation more than 10 times and for more than six cases of thoracic radiographs were selected. Six sets of two-views of (lateral and ventrodorsal [VD] or dorsoventral [DV] views) digital thoracic radiographs from six dogs per hospital were evaluated in four categories. For the lateral view, radiographic technique scores used in ten local animal hospitals improved, one remained the same, and four became worse. For the VD/DV view, the score for eleven hospitals improved and worsened for four. The most common problem was rotation (57/90) for the lateral view, followed by an inappropriate field of view (59/90), and incorrect beam center (71/90). For the VD/DV view, an inappropriate field of view (54/90) was the most common problem, followed by asymmetry (63/90), and incorrect beam center (73/90). Every factor, except rotation in the lateral view, improved after obtaining technical consultation; however, the degrees of improvement were not remarkable. There was no significant correlation between the number of requests and the degree of improvement. According to the results, the radiographic technique used in local animal hospitals was improved by technical advice on teleradiology. These changes make it possible to provide accurate diagnoses of the requested images. There are some limitations regarding the indicators of evaluation and the number of cases; therefore, further studies that use detailed indicators in large cohort group are needed. In addition, an effective method of teaching should be developed to improve radiographic techniques in local animal hospitals.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

A Study on Legislation for the Efficient Management of Private Investigation(PI) Industry in Korea (탐정 산업의 효율적 관리를 위한 법제화 연구)

  • Jun Ho Sun;Sang Min Kim;Keon Ryeong Yeom
    • Industry Promotion Research
    • /
    • v.8 no.2
    • /
    • pp.157-164
    • /
    • 2023
  • Since there are no related laws and regulations in the Korean private investigation industry, anyone can freely operate it if they report the business to the tax office. The reality is that companies hire PI to investigate rival companies and employees for specific reasons, as they generally rely on individual requests. The Korean PI industry is divided into two parts. The first are retired police officers and investigators who have experience in criminal investigation. The second are private citizen who can conduct investigation service activities runs a PI agency after everyone has registered with the tax office. It is no exaggeration to say that the current legal conflicts and legal problems that arise in the PI service cannot be ruled out because civilians are relatively less knowledgeable than PIs and legal experts. Therefore, in order for PI industry to operate stably in Korea, we will first study the concept and type of PI industry, comparative analysis of past PI laws, current status and reality of PI industry, and study the current status and references.

An Improvement of Kubernetes Auto-Scaling Based on Multivariate Time Series Analysis (다변량 시계열 분석에 기반한 쿠버네티스 오토-스케일링 개선)

  • Kim, Yong Hae;Kim, Young Han
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.73-82
    • /
    • 2022
  • Auto-scaling is one of the most important functions for cloud computing technology. Even if the number of users or service requests is explosively increased or decreased, system resources and service instances can be appropriately expanded or reduced to provide services suitable for the situation and it can improves stability and cost-effectiveness. However, since the policy is performed based on a single metric data at the time of monitoring a specific system resource, there is a problem that the service is already affected or the service instance that is actually needed cannot be managed in detail. To solve this problem, in this paper, we propose a method to predict system resource and service response time using a multivariate time series analysis model and establish an auto-scaling policy based on this. To verify this, implement it as a custom scheduler in the Kubernetes environment and compare it with the Kubernetes default auto-scaling method through experiments. The proposed method utilizes predictive data based on the impact between system resources and response time to preemptively execute auto-scaling for expected situations, thereby securing system stability and providing as much as necessary within the scope of not degrading service quality. It shows results that allow you to manage instances in detail.

An Empirical Study on the Effects of Alliance Strategy and National Culture Characteristics on Alliance Performance (제휴기업의 국가문화특성이 제휴 성과에 미치는 영향에 대한 실증분석)

  • Lee, Jungah;Kang, Nakjung
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.121-130
    • /
    • 2018
  • The purpose of this study is to analyze the effect of partnership type (pre-competitive, competitive, pro - competitive, non - competitive partnership) and national cultural characteristics on partnership performance. In order to analyze this, we conducted questionnaires on companies that have conducted international management and affiliated companies. A total of 223 questionnaires were sent. A total of 121 inquiries were collected from 224 survey requests. Based on this, a structured questionnaire was sent back to the staff members listed in the survey request, and a total of 98 samples were collected. The results of the empirical analysis through the questionnaire showed that the difference between the affiliation type and the national culture had a significant effect on the partnership performance. The results showed that the difference between the affiliation type and the national culture had a significant effect on the partnership performance. This could be a very meaningful implication for companies that are able to achieve successful alliances in a way that enables them to achieve successful alliances.